Static task
static1
Behavioral task
behavioral1
Sample
067f4052925d2127a957702c35664eb8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
067f4052925d2127a957702c35664eb8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
067f4052925d2127a957702c35664eb8_JaffaCakes118
-
Size
255KB
-
MD5
067f4052925d2127a957702c35664eb8
-
SHA1
72f0d4a660f7cd587ed1da674f8e9c09388928bb
-
SHA256
f8969bbad6ff7b33ae20846fdde4ba6f44ce8114915ccaeed9e2d0d6896d6be3
-
SHA512
3fe7237c0a1af07320209aa15d08b06181cfd56338c8a8cce1289b5a02e3c83749a9976649f8aa82ad31190ba71a4bb53eefd5ad59fcaa9620ce0875aea013d6
-
SSDEEP
6144:AWFLIoTvEFeRIedJ87Zn4k8q+Xj+F8IH7O/E:jhT6eGmC4nz+F8IbO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 067f4052925d2127a957702c35664eb8_JaffaCakes118
Files
-
067f4052925d2127a957702c35664eb8_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd0f06ecbd5d0bb74c2399a2769ad23d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
SendMessageW
ClientToScreen
GetWindowThreadProcessId
IsIconic
IsWindow
EnableMenuItem
GetForegroundWindow
GetParent
RegisterWindowMessageW
SetCursor
LoadCursorW
GetWindowLongW
DefWindowProcW
LoadStringW
GetClientRect
FindWindowW
GetActiveWindow
SetForegroundWindow
SystemParametersInfoW
MonitorFromWindow
SetWindowPos
GetDesktopWindow
CallWindowProcW
GetWindowRect
EnumChildWindows
TrackPopupMenuEx
AttachThreadInput
FlashWindow
MonitorFromPoint
GetSystemMenu
GetSystemMetrics
LoadIconW
GetWindow
SetWindowLongW
ShowWindow
CharNextW
PostMessageW
GetMonitorInfoW
GetDlgItem
MapWindowPoints
AllowSetForegroundWindow
GetClassNameW
IsWindowEnabled
ole32
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoGetMalloc
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
oleaut32
VarUI4FromStr
kernel32
HeapSize
SetCurrentDirectoryW
OutputDebugStringW
LocalFree
VirtualAlloc
GetCurrentThreadId
GetTempPathW
FindResourceW
IsDebuggerPresent
CloseHandle
UnhandledExceptionFilter
LeaveCriticalSection
LocalAlloc
FlushInstructionCache
FindResourceExW
SizeofResource
GetCurrentDirectoryW
RaiseException
GetFileSize
lstrcmpiW
LockResource
lstrlenA
GetShortPathNameW
DeleteCriticalSection
lstrlenW
ReadFile
ProcessIdToSessionId
WideCharToMultiByte
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
DisableThreadLibraryCalls
LoadResource
EnterCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
FormatMessageW
GetUserDefaultLangID
VirtualFree
HeapFree
CreateFileW
GetSystemTimeAsFileTime
WTSGetActiveConsoleSessionId
HeapDestroy
FreeLibrary
IsValidLocale
VirtualAllocEx
IsBadWritePtr
comdlg32
GetOpenFileNameW
CommDlgExtendedError
userenv
GetAllUsersProfileDirectoryW
GetProfileType
GetProfilesDirectoryW
EnterCriticalPolicySection
DeleteProfileA
panmap
DllCanUnloadNow
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.omiFFHX Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TtiEFEX Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hHrqLvX Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pPtnLvX Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hsalxlv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rWlDynv Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ